A lag in the ability to detect and respond to a security threats can be costly for businesses of all sizes.
In memory, cross platform event processing for instant notification and remediation without waiting on data queries.

Your ability to prove the limited impact of a security incident could save your business from fines, penalties, and even legal action.
Dig deep into security data to investigate incidents for remediation or audit reporting purposes.

Minimum System Requirements

HARD DRIVE

MEMORY

CPU

VIRTUAL MACHINE

Log & Event Manager is an industry favorite. Hands down.

“... unless they have a registered USB drive, I block it. LEM does all that for me.”

Guy Watkins

IT Facilities Director

Checkered Flag Motor Car Company

"Using SolarWinds LEM forensic capabilities, we were able to demonstrate to investigators and customers that a data breach had not occurred at our location where our clients’ data was stored. Being able to prove that no compromise had occurred saved us from a potentially large civil action lawsuit."

IT Manager

Small Business Computer Software Company

"We had accounts that were being locked. In the past we had to look at every log, every server. With LEM, it gave us one picture showing us everything."

Richard Noe

"We are just finishing up with our PCI certification as a service provider, and the amount of work required is significant. Our auditors were also familiar with OSSEC; however, they were also familiar with LEM and several other tools. Because of our use of LEM, we breezed through the log management components of PCI."

Byron Anderson

System Engineer

Atmosera

“... by bringing [LEM] in, we can definitely get an in-depth view of what’s going on in our environment.”

Max Kuzmenko

Senior Systems Engineer

"Certain employees attempted to pass off sensitive financial information via USB to a cell phone. The USB rule disconnected the device and fired an email to administrators."

Brian Bailey

IT/Systems Administrator

Hamlin Bank and Trust Company

Breaking rules. Nabbing accolades.

Breaking rules. Nabbing accolades.

Questions, meet answers.

Can LEM provide value out of the box?

How is LEM priced?

How is LEM deployed?

Do you offer training?

Do you offer technical support?

Is maintenance included?

See MoreSee Less

Can LEM provide value out of the box?

Yes, it can! And in more ways than one!

LEM is capable of pulling log data from over 1,200 systems, applications, and network devices right out of the box. It also comes with pre-built, ready-to-use rules, alerts, dashboards, and reports that can easily be turned on and used as is or customized for your specific security or compliance needs.

LEM is priced by the node starting at 30 nodes for $4995. In addition to being one of the most competitively priced solutions on the market, customers can receive additional savings using our specialized Windows Workstation pricing.

On a hardened virtual appliance with additional security included.

Absolutely! We’re here to help.

Our Success Center offers a variety of resources to help you get started using LEM. From in-depth documentation to help with installing and configuring, to a library of training videos and regularly scheduled LEM 101 classes, we have everything you need to get started and ramp up quickly.

In-house tech support is only a call or click away.

We offer excellent, in-house technical support from professionals whose goal is to help solve your problems in one phone call. Beyond this, THWACK, our very own user community of IT professionals, serves as an excellent resource to consult and learn from other LEM users.

Questions, meet answers.)

Yes, it can! And in more ways than one!
LEM is capable of pulling log data from over 1,200 systems, applications, and network devices right out of the box. It also comes with pre-built, ready-to-use rules, alerts, dashboards, and reports that can easily be turned on and used as is or customized for your specific security or compliance needs.

Affordable, tiered pricing, and specialized Windows® Workstations pricing.
LEM is priced by the node starting at 30 nodes for $4995. In addition to being one of the most competitively priced solutions on the market, customers can receive additional savings using our specialized Windows Workstation pricing.

On a hardened virtual appliance with additional security included.
LEM is implemented as a virtual appliance, a ready-made virtual machine image you can run on VMware® ESX® or Microsoft Windows Hyper-V®.

Absolutely! We’re here to help.
Our Success Center offers a variety of resources to help you get started using LEM. From in-depth documentation to help with installing and configuring, to a library of training videos and regularly scheduled LEM 101 classes, we have everything you need to get started and ramp up quickly.

In-house tech support is only a call or click away.
We offer excellent, in-house technical support from professionals whose goal is to help solve your problems in one phone call. Beyond this, THWACK, our very own user community of IT professionals, serves as an excellent resource to consult and learn from other LEM users.

Maintenance is included and free for one year.
SolarWinds licensed products include a year of maintenance from the date of purchase. Annual maintenance can be purchased at a fraction of the list price. Discover the benefits.

Try It Out for 30 Days

Let's Talk it Over.

Contact our team. Anytime.

What is log management?

definition

Log management involves the aggregation, parsing, and indexing of log files from a variety of sources including network devices, security devices, applications, operating systems, and more. The primary drivers of the collection and analysis of logs are IT security, improving IT and networking efficiency, and meeting and maintaining regulatory IT compliance.